|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: K.S. RajeshPublisher: John Wiley & Sons Inc Imprint: Hungry Minds Inc,U.S. Dimensions: Width: 19.00cm , Height: 4.00cm , Length: 23.40cm Weight: 1.147kg ISBN: 9780764548789ISBN 10: 0764548786 Pages: 816 Publication Date: 01 March 2002 Audience: College/higher education , Professional and scholarly , Undergraduate , Postgraduate, Research & Scholarly Format: Paperback Publisher's Status: Unknown Availability: In Print ![]() Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock. Table of ContentsForeword. Preface. Part I: Understanding Network Security. Chapter 1: Identifying Threats to Network Security. Chapter 2: Internet Protocol Network Security. Chapter 3: Detecting Intrusions. Part II: Securing Networks. Chapter 4: Securing the Network Infrastructure. Chapter 5: Securing Networks Using ACL. Chapter 6: Protecting Networks Using Cisco Perimeter Routers. Chapter 7: Cisco Encryption Technology. Part III: Security Using Firewalls. Chapter 8: Cisco IOS Firewall. Chapter 9: Cisco PIX Firewall. Part IV: Understanding and Implementing AAA. Chapter 10: Cisco AAA Security Technology. Chapter 11: Configuring the Network Access Server for AAA Security. Part V: Virtual Private Networks. Chapter 12:Fundamentals of Virtual Private Networks. Chapter 13: Securing a Virtual Private Network. Part VI: Cisco Technologies and Security Products. Chapter 14: Cisco IOS IPSec. Chapter 15: Cisco's Network--Security Management Products. Chapter 16: Cisco Firewall and VPN Management Products. Part VII: A Networking Primer. Chapter 17: Networking Basics. Chapter 18: OSI Model--An Overview. Appendix A: Assessment Questions. Appendix B: Lab Exercises. Index. End--User License Agreement.ReviewsAuthor InformationAuthor Rajesh, K.S. from NIIT is a Cisco expert on paper and in practice. He brings his Cisco security knowledge to Cisco Security Bible in the form of classroom study as well as leadership and hands--on configuration for several Cisco security network implementation projects. He is a true expert in the field. Tab Content 6Author Website:Countries AvailableAll regions |